Sikur is defining the future of secure communication. Operating globally, it has offices in Latin America, United States, and Europe. Sikur works alongside governments and corporations that believe security is fundamental to the integrity of their work. We believe that security is not only about platforms and digital systems but is a mindset that surrounds every aspect of business.

Search

Category: SIKUR

Wi-Fi enabled devices — widely known as the Internet of Things (IoT) — are populating offices and homes in greater and greater numbers.

From smartphones to connected printers and even coffee makers, most of these IoT devices have good intentions and can connect to your company’s network without a problem.

However, as the Internet of Things (IoT) devices are growing at a great pace, they continue to widen the attack surface at the same time, giving attackers a large number of entry points to affect you some or the other way.

The attackers can use your smart devices to gain backdoor entry to your network, giving them the capability to steal sensitive data, such as your personal information, along with a multitude of other malicious acts.

A HyTrust survey of 51 healthcare and biotech organizations found that 25 percent of those organizations using the public cloud do not encrypt their data.

The survey also found that 63 percent of healthcare organizations say they intend to use multiple cloud vendors.

What is troubling, is that 38 percent of organizations that have data deployed in a multi-cloud environment that included Amazon Web Service (AWS) and Azure are not using any form of encryption. This vulnerability comes as 82 percent of healthcare organizations believe security is their top concern, followed by cost.

“Multi-cloud adoption continues to gain momentum among leading healthcare organizations,” said Eric Chiu, co-founder and president, HyTrust. “For these care delivery organizations, choosing a flexible cloud security solution that is effective across multiple cloud environments is not only critical to securing patient data, but to remaining HIPAA compliant.”

Key survey findings include:

63 percent of healthcare organizations are currently using the public cloud

25 percent of healthcare organizations using the public cloud are not encrypting their data

63 percent of healthcare IT decision makers intend to use multiple cloud vendors

When Edward Snowden leaked the biggest collection of classified National Security Agency documents in history, he wasn’t just revealing the inner workings of a global surveil­lance machine. He was also scrambling to evade it. To com­municate with the journalists who would publish his secrets, he had to route all his messages over the anonymity soft­ware Tor, teach reporters to use the encryption tool PGP by creating a YouTube tutorial that disguised his voice, and eventually ditch his comfortable life (and smartphone) in Hawaii to set up a cloak-and-dagger data handoff halfway around the world.

Now, nearly four years later, Snowden has focused the next phase of his career on solving that very specific instance of the panopticon problem: how to protect reporters and the people who feed them informa­tion in an era of eroding privacy—without requiring them to have an NSA analyst’s expertise in encryption or to exile them­selves to Moscow. “Watch the journalists and you’ll find their sources,” Snowden says. “So how do we preserve that con­fidentiality in this new world, when it’s more important than ever?”

Dr. Simón Barquera, the director of nutrition policy at Mexico’s National Institute of Public Health, received disturbing text messages, as did others who were vocal proponents of Mexico’s 2014 soda tax.

Adriana Zehbrauskas for The New York Times

By NICOLE PERLROTH

SAN FRANCISCO — Last summer, Dr. Simón Barquera’s phone started buzzing with a series of disturbing text messages from unknown numbers. One said his daughter had been in a serious accident. Another claimed to be from a friend whose father had died — with a link to funeral details.

Yet another message informed Dr. Barquera, the director of nutrition policy at Mexico’s National Institute of Public Health, that a Mexican news outlet had accused him of negligence, again with a link. And in more menacing messages, someone claimed to be sleeping with Dr. Barquera’s wife. That included a link to what the sender claimed was photo evidence of their affair.

The answer is not as simple as you think. A mobile security expert parses the pros and cons.

By Satish Shetty is CEO and founder of Codeproof Technologies, an enterprise mobile security software company.

Both iOS and Android come with features that are designed to further secure enterprise applications over and above the security level of standard consumer apps. Both operating systems offer some way of segmenting enterprise data from user profile data, in effect, creating a secure container to install enterprise apps and store enterprise data. Furthermore, network transports can be secured on both platforms using technologies such as data encryption, app-specific VPN tunnels, and even some form of direct boot mode, where the device stops being a general purpose mobile device and instead becomes a dedicated device for accessing specific enterprise apps. These features are described in detail on the Android and iOS Web pages.

Both operating systems have also been found to contain pretty serious security vulnerabilities in the past. Both are vulnerable to malware attacks, although iOS less so than Android. And both are prone to exposure from potentially dangerous security vulnerabilities due to the installation of third-party apps.